[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] dump_p2m_table: For IOMMU
New key handler 'o' to dump the IOMMU p2m table for each domain. Skips dumping table for domain0. Intel and AMD specific iommu_ops handler for dumping p2m table. Signed-off-by: Santosh Jodh <santosh.jodh@xxxxxxxxxx> diff -r 472fc515a463 -r 68946c7e1d67 xen/drivers/passthrough/amd/pci_amd_iommu.c --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c Tue Aug 07 18:37:31 2012 +0100 +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c Wed Aug 08 08:55:49 2012 -0700 @@ -22,6 +22,7 @@ #include <xen/pci.h> #include <xen/pci_regs.h> #include <xen/paging.h> +#include <xen/softirq.h> #include <asm/hvm/iommu.h> #include <asm/amd-iommu.h> #include <asm/hvm/svm/amd-iommu-proto.h> @@ -512,6 +513,69 @@ static int amd_iommu_group_id(u16 seg, u #include <asm/io_apic.h> +static void amd_dump_p2m_table_level(struct page_info* pg, int level, u64 gpa) +{ + u64 address; + void *table_vaddr, *pde; + u64 next_table_maddr; + int index, next_level, present; + u32 *entry; + + if ( level <= 1 ) + return; + + table_vaddr = __map_domain_page(pg); + if ( table_vaddr == NULL ) + { + printk("Failed to map IOMMU domain page %-16lx\n", page_to_maddr(pg)); + return; + } + + for ( index = 0; index < PTE_PER_TABLE_SIZE; index++ ) + { + if ( !(index % 2) ) + process_pending_softirqs(); + + pde = table_vaddr + (index * IOMMU_PAGE_TABLE_ENTRY_SIZE); + next_table_maddr = amd_iommu_get_next_table_from_pte(pde); + entry = (u32*)pde; + + next_level = get_field_from_reg_u32(entry[0], + IOMMU_PDE_NEXT_LEVEL_MASK, + IOMMU_PDE_NEXT_LEVEL_SHIFT); + + present = get_field_from_reg_u32(entry[0], + IOMMU_PDE_PRESENT_MASK, + IOMMU_PDE_PRESENT_SHIFT); + + address = gpa + amd_offset_level_address(index, level); + if ( (next_table_maddr != 0) && (next_level != 0) + && present ) + { + amd_dump_p2m_table_level( + maddr_to_page(next_table_maddr), level - 1, address); + } + + if ( present ) + { + printk("gfn: %-16lx mfn: %-16lx\n", + address, next_table_maddr); + } + } + + unmap_domain_page(table_vaddr); +} + +static void amd_dump_p2m_table(struct domain *d) +{ + struct hvm_iommu *hd = domain_hvm_iommu(d); + + if ( !hd->root_table ) + return; + + amd_dump_p2m_table_level(hd->root_table, hd->paging_mode, 0); +} + const struct iommu_ops amd_iommu_ops = { .init = amd_iommu_domain_init, .dom0_init = amd_iommu_dom0_init, @@ -531,4 +595,5 @@ const struct iommu_ops amd_iommu_ops = { .resume = amd_iommu_resume, .share_p2m = amd_iommu_share_p2m, .crash_shutdown = amd_iommu_suspend, + .dump_p2m_table = amd_dump_p2m_table, }; diff -r 472fc515a463 -r 68946c7e1d67 xen/drivers/passthrough/iommu.c --- a/xen/drivers/passthrough/iommu.c Tue Aug 07 18:37:31 2012 +0100 +++ b/xen/drivers/passthrough/iommu.c Wed Aug 08 08:55:49 2012 -0700 @@ -18,6 +18,7 @@ #include <asm/hvm/iommu.h> #include <xen/paging.h> #include <xen/guest_access.h> +#include <xen/keyhandler.h> #include <xen/softirq.h> #include <xsm/xsm.h> @@ -54,6 +55,8 @@ bool_t __read_mostly amd_iommu_perdev_in DEFINE_PER_CPU(bool_t, iommu_dont_flush_iotlb); +void setup_iommu_dump(void); + static void __init parse_iommu_param(char *s) { char *ss; @@ -119,6 +122,7 @@ void __init iommu_dom0_init(struct domai if ( !iommu_enabled ) return; + setup_iommu_dump(); d->need_iommu = !!iommu_dom0_strict; if ( need_iommu(d) ) { @@ -654,6 +658,46 @@ int iommu_do_domctl( return ret; } +static void iommu_dump_p2m_table(unsigned char key) +{ + struct domain *d; + const struct iommu_ops *ops; + + if ( !iommu_enabled ) + { + printk("IOMMU not enabled!\n"); + return; + } + + ops = iommu_get_ops(); + for_each_domain(d) + { + if ( !d->domain_id ) + continue; + + if ( iommu_use_hap_pt(d) ) + { + printk("\ndomain%d IOMMU p2m table shared with MMU: \n", d->domain_id); + continue; + } + + printk("\ndomain%d IOMMU p2m table: \n", d->domain_id); + ops->dump_p2m_table(d); + } +} + +static struct keyhandler iommu_p2m_table = { + .diagnostic = 0, + .u.fn = iommu_dump_p2m_table, + .desc = "dump iommu p2m table" +}; + +void __init setup_iommu_dump(void) +{ + register_keyhandler('o', &iommu_p2m_table); +} + + /* * Local variables: * mode: C diff -r 472fc515a463 -r 68946c7e1d67 xen/drivers/passthrough/vtd/iommu.c --- a/xen/drivers/passthrough/vtd/iommu.c Tue Aug 07 18:37:31 2012 +0100 +++ b/xen/drivers/passthrough/vtd/iommu.c Wed Aug 08 08:55:49 2012 -0700 @@ -31,6 +31,7 @@ #include <xen/pci.h> #include <xen/pci_regs.h> #include <xen/keyhandler.h> +#include <xen/softirq.h> #include <asm/msi.h> #include <asm/irq.h> #if defined(__i386__) || defined(__x86_64__) @@ -2365,6 +2366,56 @@ static void vtd_resume(void) } } +static void vtd_dump_p2m_table_level(u64 pt_maddr, int level, u64 gpa) +{ + u64 address; + int i; + struct dma_pte *pt_vaddr, *pte; + int next_level; + + if ( pt_maddr == 0 ) + return; + + pt_vaddr = (struct dma_pte *)map_vtd_domain_page(pt_maddr); + if ( pt_vaddr == NULL ) + { + printk("Failed to map VT-D domain page %-16lx\n", pt_maddr); + return; + } + + next_level = level - 1; + for ( i = 0; i < PTE_NUM; i++ ) + { + if ( !(i % 2) ) + process_pending_softirqs(); + + pte = &pt_vaddr[i]; + if ( !dma_pte_present(*pte) ) + continue; + + address = gpa + offset_level_address(i, level); + if ( next_level >= 1 ) + vtd_dump_p2m_table_level(dma_pte_addr(*pte), next_level, address); + + if ( level == 1 ) + printk("gfn: %-16lx mfn: %-16lx superpage=%d\n", + address >> PAGE_SHIFT_4K, pte->val >> PAGE_SHIFT_4K, dma_pte_superpage(*pte)? 1 : 0); + } + + unmap_vtd_domain_page(pt_vaddr); +} + +static void vtd_dump_p2m_table(struct domain *d) +{ + struct hvm_iommu *hd; + + if ( list_empty(&acpi_drhd_units) ) + return; + + hd = domain_hvm_iommu(d); + vtd_dump_p2m_table_level(hd->pgd_maddr, agaw_to_level(hd->agaw), 0); +} + const struct iommu_ops intel_iommu_ops = { .init = intel_iommu_domain_init, .dom0_init = intel_iommu_dom0_init, @@ -2387,6 +2438,7 @@ const struct iommu_ops intel_iommu_ops = .crash_shutdown = vtd_crash_shutdown, .iotlb_flush = intel_iommu_iotlb_flush, .iotlb_flush_all = intel_iommu_iotlb_flush_all, + .dump_p2m_table = vtd_dump_p2m_table, }; /* diff -r 472fc515a463 -r 68946c7e1d67 xen/drivers/passthrough/vtd/iommu.h --- a/xen/drivers/passthrough/vtd/iommu.h Tue Aug 07 18:37:31 2012 +0100 +++ b/xen/drivers/passthrough/vtd/iommu.h Wed Aug 08 08:55:49 2012 -0700 @@ -248,6 +248,8 @@ struct context_entry { #define level_to_offset_bits(l) (12 + (l - 1) * LEVEL_STRIDE) #define address_level_offset(addr, level) \ ((addr >> level_to_offset_bits(level)) & LEVEL_MASK) +#define offset_level_address(offset, level) \ + ((u64)(offset) << level_to_offset_bits(level)) #define level_mask(l) (((u64)(-1)) << level_to_offset_bits(l)) #define level_size(l) (1 << level_to_offset_bits(l)) #define align_to_level(addr, l) ((addr + level_size(l) - 1) & level_mask(l)) @@ -277,6 +279,7 @@ struct dma_pte { #define dma_set_pte_addr(p, addr) do {\ (p).val |= ((addr) & PAGE_MASK_4K); } while (0) #define dma_pte_present(p) (((p).val & 3) != 0) +#define dma_pte_superpage(p) (((p).val & (1<<7)) != 0) /* interrupt remap entry */ struct iremap_entry { diff -r 472fc515a463 -r 68946c7e1d67 xen/include/asm-x86/hvm/svm/amd-iommu-defs.h --- a/xen/include/asm-x86/hvm/svm/amd-iommu-defs.h Tue Aug 07 18:37:31 2012 +0100 +++ b/xen/include/asm-x86/hvm/svm/amd-iommu-defs.h Wed Aug 08 08:55:49 2012 -0700 @@ -38,6 +38,10 @@ #define PTE_PER_TABLE_ALLOC(entries) \ PAGE_SIZE * (PTE_PER_TABLE_ALIGN(entries) >> PTE_PER_TABLE_SHIFT) +#define amd_offset_level_address(offset, level) \ + ((u64)(offset) << ((PTE_PER_TABLE_SHIFT * \ + (level - IOMMU_PAGING_MODE_LEVEL_1)))) + #define PCI_MIN_CAP_OFFSET 0x40 #define PCI_MAX_CAP_BLOCKS 48 #define PCI_CAP_PTR_MASK 0xFC diff -r 472fc515a463 -r 68946c7e1d67 xen/include/xen/iommu.h --- a/xen/include/xen/iommu.h Tue Aug 07 18:37:31 2012 +0100 +++ b/xen/include/xen/iommu.h Wed Aug 08 08:55:49 2012 -0700 @@ -141,6 +141,7 @@ struct iommu_ops { void (*crash_shutdown)(void); void (*iotlb_flush)(struct domain *d, unsigned long gfn, unsigned int page_count); void (*iotlb_flush_all)(struct domain *d); + void (*dump_p2m_table)(struct domain *d); }; void iommu_update_ire_from_apic(unsigned int apic, unsigned int reg, unsigned int value); _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |